Avoiding Transient Loops through Interface-Specific Forwarding

Size: px
Start display at page:

Download "Avoiding Transient Loops through Interface-Specific Forwarding"

Transcription

1 Avoiding Transient Loops through Interface-Specific Forwarding Zifei Zhong, Ram Keralapura 2, Srihari Nelakuditi, Yinzhe Yu 3, Junling Wang, Chen-Nee Chuah 2, and Sanghwan Lee 3 Department of Computer Science & Engineering, University of South Carolina, Columbia, SC 2208, USA {zhongz,srihari,wang257}@cse.sc.edu 2 Department of Electrical & Computer Engineering, University of California at Davis, Davis, CA 566, USA {rkeralap,chuah}@ece.ucdavis.edu 3 Department of Computer Science & Engineering, University of Minnesota, Minneapolis, MN 5544, USA {yyu,sanghwan}@cs.umn.edu Abstract. Under link-state routing protocols such as OSPF and IS-IS, when there is a change in the topology, propagation of link-state announcements, path recomputation, and updating of forwarding tables (FIBs) will all incur some delay before traffic forwarding can resume on alternate paths. During this convergence period, routers may have inconsistent views of the network, resulting in transient forwarding loops. Previous remedies proposed to address this issue enforce a certain order among the nodes in which they update their FIBs. While such approaches succeed in avoiding transient loops, they incur additional message overhead and increased convergence delay. We propose an alternate approach, loopless interface-specific forwarding (LISF), that averts transient loops by forwarding a packet based on both its incoming interface and destination. LISF requires no modifications to the existing link-state routing mechanisms. It is easily deployable with current routers since they already maintain a FIB at each interface for lookup efficiency. This paper presents the LISF approach, proves its correctness, discusses three alternative implementations of it and evaluates their performance. Introduction The widely used link state routing protocols such as OSPF and IS-IS distribute link states so that each router has a complete description of the network topology. When a link fails due to a faulty interface or a fiber cut [], the nodes adjacent to the failure detect it and flood this change in link state to the rest of the network so that all the routers can recompute their routing tables. These routing table entries are then pushed onto Forwarding Information Base (FIB) at all line

2 cards. Each of these steps failure detection, link state propagation, routing table recomputation and FIB updates incur some delay. Only after these steps are complete, packets, for which the shortest paths to their destinations are affected by the failed link, are guaranteed to be forwarded correctly along the new alternate paths. The interval between the failure detection and the FIB updates at all the routers, is referred to as the convergence delay. During the convergence period, routers may have inconsistent views of the network and therefore can cause forwarding loops [2]. While these loops last for only a short time and their effect is mitigated by the TTL field in IP datagrams, they can still overwhelm high capacity links and render them unusable. Therefore, it is desirable to avoid any forwarding loops even if they are only transient. Several remedies for the transient looping problem have been suggested in the literature [2 6] 4 and an IETF working group has been addressing this issue []. Path locking with safe neighbors approach [2] categorizes routes into three types A, B, or C, and installs new routes for B and C types after a fixed configurable delay such that delay for type B is greater than delay for type C routes. While this approach decreases the likelihood of loops, it does not completely eliminate them. Moreover, it introduces additional delays in the installation of new routes compounding the convergence delay. A loop-free path-finding algorithm proposed in [3] blocks a potential loop when it detects that a loop can be formed. To achieve this, a router first reports to all its neighbors that its distance to reach the destination is infinity, and then waits for those neighbors to acknowledge its message with their own distances and predecessor information before updating its successor in the forwarding table. Recently, similar methods have been proposed in [4, 5], where the forwarding table updates in the network are ordered such that a node updates its forwarding table only after all its neighbors that use the node to reach different destinations through the failed link update their forwarding tables. Although these schemes do avoid transient loops, they require additional messages to be exchanged among routers, to enforce the ordering of the updates of forwarding tables, resulting in increased convergence delay. In this paper, we propose an alternate approach loopless interface-specific forwarding (LISF) that exploits the existence of one forwarding table per interface to avoid transient loops without requiring any changes to the existing link state routing mechanisms. When all the routers in a network have the same view of the network, there would not be a forwarding loop. Only in the presence of discrepancies in the views of different routers, a packet might get caught in a loop. In such a case, the packet would have arrived through an unusual interface of at least one of the routers involved in the loop. Therefore, a forwarding loop can be avoided if the packet were to be discarded in such a scenario rather than forwarded to the usual next hop. LISF does precisely that by selectively discarding packets that arrive through unusual interfaces. The key advantages of LISF are that it avoids transient loops without increasing the convergence delay 4 Many other schemes have been proposed to deal with failures through fast local rerouting [5,7,8]. However, the focus of this paper is on schemes specifically designed for loop avoidance during convergence after a network-wide link state update.

3 and without employing any additional mechanisms to synchronize the forwarding table updates in different nodes. The rest of this paper is structured as follows. In Section 2, we illustrate the problem of transient loops. Our LISF approach for avoiding forwarding loops and three possible implementations of it are described in Section 3. In Section 4, we prove that the proposed LISF methods prevent loops in case of symmetric single link failures. The results of our simulations evaluating the LISF methods are presented in Section 5. We finally conclude the paper in Section 6. 2 Transient Looping Problem and Existing Approaches We now illustrate the occurrence of transient loops, discuss a recently proposed approach for avoiding them, and point out the need for an alternate approach. We use an example to illustrate the problem of transient loops. Consider the topology shown in Fig. (a), where each directed link is labeled with its weight. For the purpose of illustration, let us assume that all the nodes have similar characteristics with a failure detection time of 50ms, a failure notification time between neighboring nodes of 00ms, and route computation and update time of 400ms at a node (00ms for nodes that are not affected by the failure). Consider a scenario where link E D fails at time 0s. We examine how this failure impacts the forwarding of packets from source node A to destination node D. Table summarizes the routing events under the traditional OSPF and the corresponding changes in the packet s forwarding path from node A to node D. The resulting convergence delay (i.e., the total time for all the nodes in the network to converge after the failure) is 0.65s, and the service disruption time (i.e., the total time for which the service between A and D is disrupted due to the failure) is 0.55s. During the interval between the forwarding table updates in nodes E and F (i.e, between 0.45s and 0.55s), both the nodes have a different view of the network, resulting in a forwarding loop. A 2 2 B 4 C D A B G C 5 5 D 4 F E F E (a) (b) Fig.. Topologies used for illustration

4 Table. Summary of routing events under OSPF, ORDR, and LISF OSPF LISF ORDR Time Events A to D pkts A to D pkts Events 0s Failure of link E-D A-F-E-drop A-F-E-drop Failure of link E-D 0.05s D,E: failure detected A-F-E-drop A-F-E-drop D,E: failure detected 0.5s C,F: failure notified A-F-E-drop A-F-E-drop C,F: failure notified 0.25s A,B: failure notified A-F-E-drop A-F-E-drop A,B: failure notified 0.35s B: route update A-F-E-drop A-F-E-drop B: route update 0.45s D,E: route update A-F-E-F-...(loop) A-F-E-F-drop 0.55s C,F: route update A-F-B-C-D A-F-B-C-D C: route update 0.65s A: route update A-B-C-D A-B-C-D A: route update.05s D: route update.5s F: route update.65s E: route update To avoid transient loops during the convergence after a planned link failure or an unplanned failure of a protected link, a method was proposed in [4] that ensures ordered installation of forwarding table entries by exchanging messages between neighboring nodes. Here, we consider a similar approach (which we refer to as ORDR) for avoiding loops in case of unplanned failures (around 80% of all failures according to []) of unprotected links. The routing events under ORDR corresponding to Fig. (a) are shown in Table. Note that with this method, F updates its forwarding table 500 ms (assuming update time of 400 ms and the message propagation and processing time of 00 ms) after A updates its table. While this method avoids forwarding loops, its drawback is that it increases the network convergence delay. For the scenario discussed here, this method extends the convergence delay to.65s. Our objective is to develop a scheme that combines the best features of OSPF and ORDR, i.e., low convergence delay and disruption time of OSPF and loop avoidance of ORDR. Such a scheme would ideally respond to the failure of E D as shown in Table. Its behavior would be effectively similar to OSPF except that a packet is dropped if it would loop otherwise (as in the case of packets destined to D from F or E during the interval from 0.45s to 0.55s). Consequently, the ideal scheme would have the convergence delay of 0.65s and service disruption time of 0.45s while also avoiding forwarding loops. In the following sections, we present and evaluate a scheme that closely approximates this ideal behavior. 3 Our Approach Our approach for avoiding forwarding loops is based on the notion of interfacespecific forwarding, where a packet s forwarding depends on the incoming interface in addition to the destination address. In this section, we first briefly explain

5 interface-specific forwarding and argue how it can be exploited to avoid loops. We then present three methods of computing interface-specific forwarding table entries and illustrate the differences between these methods in terms of loop avoidance and computational complexity. 3. Interface-Specific Forwarding A packet in an IP network is traditionally routed based on its destination address alone regardless of its source address or the incoming interface. Therefore, a single forwarding table that maps a destination address to a next hop and an outgoing interface is sufficient for current routers to perform IP datagram forwarding. Nevertheless, routers nowadays maintain a forwarding table at each line card of an interface for lookup efficiency. However, all these forwarding tables at each interface are identical, i.e., these forwarding tables are interfaceindependent. For example, interface-independent forwarding tables at node B of Fig. (a) are as given in Table 2. Instead of maintaining the same forwarding table at each interface, it is possible to avoid forwarding loops by making the entries of these forwarding tables interface-specific. Table 3 gives the possible set of interface-specific forwarding table entries at node B of Fig. (a). Each entry is marked with, X, or a nexthop node. The entries marked are obviously never used. The entries marked X are not referenced normally, i.e., when there is no failure and all nodes in the network have the same consistent view. For example, in Fig. (a), a packet with destination D should not arrive at B from any of its neighbors since B is not the next hop for them. Similarly, B should not receive from A, a packet destined for F, since A is along the path from B to F. However, in the presence of link failures and inconsistent forwarding tables at different nodes (during the convergence period), a packet may arrive at a node through an unusual interface. Interface-specific forwarding enables special treatment of such packets that arrive through unusual interfaces without introducing any changes to the forwarding plane of the current network infrastructure. Here, we study how interface-specific forwarding can be exploited for the purpose of avoiding loops during the convergence period after a link state change in the network. Table 2. Interface-independent forwarding tables at node B interface destination A C D E F A B A C C A A C B A C C A A F B A C C A A Table 3. Interface-specific forwarding tables at node B interface destination A C D E F A B C X X X C B A X X A F B A C X X

6 3.2 Loopless Interface-Specific Forwarding It is clear that under link state routing, when all the routers in a network have the same view of the network, there would not be a forwarding loop. Only in the presence of discrepancies in the views of different routers, a packet might get caught in a loop. However, in such a case, under interface-specific forwarding, the packet would have arrived through an unusual interface of at least one of the routers involved in the loop. So a forwarding loop can be avoided if the packet were to be discarded in such a scenario rather than forwarded to the usual next hop. We refer to this approach of avoiding forwarding loops by selectively discarding packets that arrive through unusual interfaces as loopless interfacespecific forwarding (LISF). Ideally, a packet should be discarded by a router only if its forwarding would definitely result in a loop. However, with only its own local view of the network, a router cannot always determine the actual forwarding path of a packet with certainty. Therefore, the design challenge of LISF is to ensure loop freedom without unnecessarily discarding packets. In this paper, we study several implementation choices of LISF, ranging from conservative discarding of packets only if there would certainly be a loop otherwise but forwarding even if there could be a loop, to aggressively discarding of packets whenever there could be a loop even if there may not actually be a loop. Before we proceed to present various LISF methods, we first introduce some notation that would help describe them. Let G = (V, E) be the graph with vertices V and edges E representing the network. We use R d i to denote the next hop 5 from i to d in G. Let Fj i d denote the forwarding table entry, i.e., the next hop to d for packets arriving at i through the interface associated with neighbor j. We use Pi d to refer to the shortest path from i to d given the graph G. Similarly, the cost of the shortest path is denoted by Ci d. We now present three different LISF methods. The difference between these methods lies in which of the entries marked X in Table 3 are set to, meaning discard. These methods are named according to the criterion they use to discard a packet. The operation of these methods, when a packet for destination d arrives at node i from neighbor j, is summarized in Table 4 and elaborated in detail below. It should be noted that, under LISF, a node i makes packet forwarding/discarding decisions based solely on its own view of the network. Table 4. Differences in LISF methods in discarding a packet to d arriving at i from j method discard condition discard criterion PIng-POng (PIPO) j R d i in and out interfaces are same CYCLe (CYCL) j P d i previous node along the path NO Forward Progress (NOFP) C d R d i C d j no forward progress 5 Note that LISF works even with Equal Cost Multipath (ECMP) routing. But for ease of explanation, it is assumed that there is only one shortest path per destination.

7 Table 5. Interface-specific forwarding tables at B under different LISF methods interface destination A C D E F A B C C C B A A A F B A C C A (PIPO) destination A C D E F C C A A A A C C (CYCL) destination A C D E F C A A A A C (NOFP) PIPO Discard a packet if its incoming and outgoing interfaces are the same, i.e., F d j i = if j Rd i. PIPO discards a packet only when it arrives at a node from its next hop, i.e., along the reverse shortest path to the destination. It is the most conservative of all the methods listed here as it discards a packet only when there is a loop. Otherwise, without PIPO, in such a scenario, packets will ping-pong between two neighboring nodes. For example, in Table 5, a packet to destination D arriving at B from C is discarded by PIPO since C is the next hop to D from B. PIPO is also the simplest since it incurs no additional overhead for computing interfacespecific forwarding table entries beyond the currently used Dijkstra s algorithm for computing interface-independent forwarding tables. However, PIPO can ensure loop-freedom only when two nodes are involved in a loop, which is the case when links are symmetric (bidirectional with equal weights in both directions) and inconsistency in the views among routers is limited to a single link s state. CYCL Discard a packet if the previous node appears along the path from this node to the destination, i.e., F d j i = if j Pd i. CYCL discards a packet when it arrives from a node which falls along the shortest path from this node to the destination. When the links are symmetric, CYCL behaves just like PIPO. Only when links are asymmetric and the resulting paths are asymmetric, the operation of CYCL could be different from PIPO. With a less stringent condition than PIPO, CYCL may discard a packet even when there may not actually be a loop, but at the same time, it can avoid some loops that are not avoided by PIPO. For example, in Table 5, a packet to destination E arriving at B from F is forwarded by PIPO to A resulting in a loop whereas it will be discarded by CYCL since F is along the shortest path from B to E. The computational complexity of CYCL is similar to that of PIPO as both require only a single shortest path tree computation. NOFP Discard a packet if there is no forward progress towards its destination from its previous hop to the next hop of this node, i.e., F d j i = if Cd R d i C d j. NOFP discards a packet if its previous hop is not farther from its destination than the next hop of this node. In such a case, there is a potential for a loop and

8 NOFP discards such packets. For example, in Table 5, a packet to destination D arriving at B from F is discarded by NOFP since the cost from F to D is 2 whereas the cost from the next hop C is 3. This is in contrast to both PIPO and CYCL which forward the packet to C. While such discarding by NOFP seems unnecessary, NOFP can prevent more loops than PIPO and CYCL even when links are asymmetric and the state of multiple links change simultaneously. For example, in topology shown in Fig. (b), suppose link F E failed. Further, assume that all nodes except nodes B and C are notified of the failure and their forwarding tables reflect the failure. In this scenario, under PIPO and CYCL, a packet from A to D is forwarded along a loop A B G C A B. On the other hand, under NOFP, it is discarded by B since, according to B s view, the cost of 3 from next hop G to D is not smaller than the cost from A to D which is also 3. The downside however is that, a straightforward method to implement NOFP requires a computation of O( E V ) times Dijkstra on the average (to compute the shortest path trees rooted at each neighbor), whereas PIPO and CYCL have the same complexity as Dijkstra. Table 6. Differences among LISF methods in discarding packets arriving at node B from to failed link PIPO CYCL NOFP C D C D discard discard discard F E F E forward to A discard discard F D F E forward to C forward to C discard C E C D forward to A forward to A forward to A The difference between the actions of the above three methods is clearly evident in the presence of failures of links C D and F E in Fig. (a) as shown in Table 6. Here it is assumed that B is not yet aware of the failed links and the forwarding tables of B do not reflect the change. When only F E fails, packets from F to D arriving at B are discarded by NOFP whereas PIPO and CYCL forward them along a loop-free path via C. Essentially these methods achieve different tradeoffs between loop-avoidance and packet-discarding, which can be summed up as follows. packet looping probability: PIPO CYCL NOFP packet discard probability: PIPO CYCL NOFP network convergence delay: PIPO = CYCL = NOFP 4 Proof of Loop-free Property of LISF We now prove that the LISF methods described in the previous section ensure loop-freedom when at most a single link state change is being propagated in a network with symmetric links. It is clear that if PIPO is loop-free, other two

9 methods are also loop-free since whenever PIPO discards a packet, they would too. Therefore, it suffices to provide the proof for PIPO which is given below. We use the following notation in this section. Let T D be the shortest path tree with undirected links rooted at a destination D. Note that this tree contains the shortest paths from every node to D since the links are symmetric. We use S(i, T ) to denote the subtree of T below the node i. Since the forwarding to a destination is independent of forwarding to other destinations, in the following we prove it for a destination D. l b b B B a l sub tree rooted at node F A a e A 2... r 2 l n b A r F L D A n a l n b n B n e n B n Fig. 2. Scenarios for illustrating loop-freedom under PIPO Theorem. A packet destined for D will not loop under PIPO in case of the failure of a link l. Proof. If l T D, the forwarding path to D is the same with or without the failure of l. Therefore, the forwarding to D is consistent at every node along the path and hence packets destined for D will not be caught in a loop due to the failure of l. In the rest of the proof, it is assumed that l T D. Let l = F L and F be the upstream node to L on the path from F to D as in Fig. 2. When l is down, only those nodes in S(F, T D ) will be affected (i.e., all nodes outside the subtree will forward along the same path with or without F -L for destination D). Now consider a packet originating from any node in S(F, T D ). That packet may be forwarded to node F and then get rerouted, or get rerouted somewhere in S(F, T D ). Once the packet goes outside the subtree, it will be forwarded to D consistently. So the only possible loop is the one consisting of nodes which are all within S(F, T D ). Thus, to prove loop-freedom under PIPO, we only need to show that there will not be a loop within S(F, T D ).

10 Suppose there is a loop in subtree S(F, T D ). The loop must contain some nodes that are aware and some that are unaware of the failed link F L. Pick an arbitrary node, A, in the loop that is aware of the failure. As shown in Fig. 2, suppose the packet starts from A and is routed along zero or more A nodes (i.e., nodes that are aware of the failure and forward in consistence as A ), and reaches A, the last A node in this stretch. A forwards the packet to B, a node unaware of the failure. Note that from A to B, the forwarding is consistent (with PA D (E \ l)). We use the dashed line to indicate this subpath of PA D (E \l). B then reroutes the packet: instead of towards D via the dashed path, it forwards the packet via the dotted path towards B, i.e., it chooses B B A 2 F L D. Similarly, the packet is rerouted at A 2, which intends to forward it to D through the next stretch of dashed path. This process continues until the packet is forwarded back to A by B n (n ). Now we show that there is a contradiction if such a loop exists. Note that in such a loop, any B i can not forward a packet back to A i after getting the packet from A i (e.g., A i+ A i ), as the packet will get dropped under PIPO when being forwarded back to A i. Then consider the reroute decision at node B i( i n). Since the node B i chooses the path B i A i+ F over B i A i F, we have n n (b i + li b + r i+ ) < (a i + li a + r i ) () i= Adding them together, we have i= b n + l b n + r < a n + l a n + r n (2) n (b i + li b ) < i= n (a i + li a ) (3) Similarly, consider the rerouting decision made at node A i. Since it chooses the path A i B i D over the path A i B i D, i= n n (a i+ + li+ a + e i+ ) < (b i + li b + e i ) (4) i= Adding them together, we get i= a + l a + e < b n + l b n + e n (5) n (a i + li a ) < i= n (b i + li b ) (6) Obviously, formula (6) above contradicts formula (3). Therefore, a forwarding loop is not possible under PIPO in case of a single link failure. Using similar arguments as above, we can show that PIPO avoids forwarding loops during the convergence period after not only a failure but any change in the state of a link. i=

11 5 Performance Evaluation In this section, we evaluate the performance of LISF methods and compare them against OSPF and ORDR. We first simulate single link failures and demonstrate that LISF methods prevent a significant number of loops that are possible under OSPF, and also have lower convergence delay than ORDR. We then experiment with scenarios of multiple failures to further study the tradeoffs of LISF methods between packet-discarding and loop-avoidance. 5. Single Link Failures To evaluate LISF methods, we built a control plane simulator that emulates intra-domain routing dynamics in the presence of link failures and measures both service disruption (SD) time between different origin-destination (OD) pairs and network convergence (NC) time as presented in [0]. We use a Tier- ISP backbone (PoP-level) topology with 20 nodes and 42 links in our simulations which was used earlier in [0]. We assign OSPF link weights to different links by randomly picking integer values between and 5. We consider both symmetric links where X Y has the same OSPF weight as Y X, and asymmetric links where the OSPF weight for X Y could be different from Y X. The forwarding table at each node includes entries for all the prefixes in the Internet. We assume that the rate of FIB update is 20 entries/ms and the number of prefixes is The other parameters in the simulator are set based on the findings in []. In every simulation run, we fail each link in the network exactly once. The results presented below represent the effect of all the link failures in a simulation run PIPO CYCL NOFP OSPF Note: All the LISF schemes are identical to OSPF PIPO CYCL NOFP OSPF Note: All the LISF schemes are identical to OSPF SD Time Per Failure (sec) SD Time Per Failure (sec) Different OD Pairs Different OD Pairs (a) symmetric links (b) asymmetric links Fig. 3. Average service disruption time per link failure for various O-D pairs The total time during which a forwarding loop exists under OSPF is observed to be.85s, whereas LISF methods, as expected, have no loops in case of

12 symmetric link failures. For the case of asymmetric link failures, OSPF has loops for a duration of 6.8s, while it is 0.056s for PIPO. In both cases, there are no loops under CYCL or NOFP. These results demonstrate the effectiveness of LISF methods in avoiding loops. We proceed to show that this is achieved not at the expense of larger convergence delay or longer service disruption. Figure 3(a) represents the average SD time experienced by all OD pairs due to a single link failure in this network with symmetric links. We can clearly see that the average SD time for a particular OD pair remains the same when LISF is implemented on top of OSPF. This shows that LISF does not add any extra SD time. Figure 3(b) shows a very similar behavior of average SD time for this network with asymmetric links PIPO CYCL NOFP ORDR OSPF Note: All schemes are identical except ORDR PIPO CYCL NOFP ORDR OSPF Note: All schemes are identical except ORDR 6 6 Network Convergence Time (sec) Network Convergence Time (sec) Different Link Failures Different Link Failures (a) symmetric links (b) asymmetric links Fig. 4. Network convergence time due to various single link failures Let NC time represent the total time taken for the network to converge after a link failure. Fig. 4(a) and Fig. 4(b) show the NC time due to different link failures for the backbone network with symmetric and asymmetric links respectively. Given that some nodes in the network have to wait for a longer time to update their FIBs under ORDR, it is easy to see that a network with ORDR exhibits higher NC times when compared to a network with LISF where no synchronization is needed between nodes for updating their FIBs. Fig. 5(a) shows the packet discard times due to various LISF methods in the ISP network with symmetric links. As expected, with symmetric link failures, the packet discard times of PIPO and CYCL are identical, and NOFP is quite close to PIPO. A similar pattern is observed even with asymmetric links (Fig. 5(b)). However, the packet discard times under PIPO and CYCL are not identical due to the fact that more loops are avoided by CYCL compared to PIPO.

13 PIPO CYCL NOFP 0.3 PIPO CYCL NOFP Packet Drop Time Per Failure (sec) Packet Drop Time Per Failure (sec) Different OD Pairs (a) symmetric links (b) asymmetric links Fig. 5. Average packet discard time per link failure for various OD pairs 5.2 Multiple Link Failures To further evaluate LISF methods, we simulated failures of multiple links and nodes. For this study, we did not use the control-plane simulator mentioned above as it can only handle single link failures. Instead, we used a simplified model to approximate link state propagation and route computation and FIB update times. It is assumed that link state propagation takes time unit per hop and route computation and FIB update time is 3 units. We simulate single node failures and also simultaneous failures of 2 nodes, and also 2 links and 3 links. In each failure scenario, we forward a packet between every pair of nodes and count the number of node pairs for whom packets are undeliverable and also those that get caught in a loop. Table 7. Comparison of LISF methods and OSPF in case of multiple failures looping probability % of undeliverable node pairs failures OSPF PIPO CYCL NOFP OSPF PIPO CYCL NOFP 2 links links node nodes Table 7 shows the relative performance of different LISF methods and OSPF in terms of their ability to avoid loops and deliver packets. ORDR is not included here as it is not designed to deal with multiple failures. PIPO and CYCL yield identical performance since the links are symmetric. Compared to OSPF, loops

14 are close to 000 times less likely to happen with PIPO and CYCL, whereas no loops occur under NOFP. In terms of packet delivery, both PIPO and CYCL have the same performance as OSPF. The delivery ratio of NOFP is only slightly worse than OSPF. Considering that NOFP prevents loops without excessive discarding of packets, we believe LISF approach with NOFP method is a viable alternative for avoiding transient loops during the convergence of intra-domain routing schemes in IP networks. 6 Conclusions In this paper, we proposed a simple interface-specific forwarding based approach called LISF to avoid transient forwarding loops during the network convergence periods. LISF approach selectively discards packets arriving through unusual interfaces when they are likely to be caught in a loop. We have demonstrated that LISF incurs no additional message overhead compared to OSPF and avoids forwarding loops like ORDR without increasing the network convergence time. We have presented several LISF methods and evaluated their performance. We observed that simple PIPO is effective in eliminating most of the loops and NOFP provides the best trade-off between packet-discarding and loop-avoidance. References. Markopulu, A., Iannaccone, G., Bhattacharya, S., Chuah, C.N., Diot, C.: Characterization of failures in an IP backbone. In: Proc. IEEE Infocom. (2004) 2. Zinin, A.: Analysis and minimization of microloops in link-state routing protocols (2004) Internet draft, draft-zinin-microloop-analysis-00.txt, work in progress. 3. Garcia-Luna-Aceves, J., Murthy, S.: A path-finding algorithm for loop-free routing. IEEE/ACM Transactions on Networking 5 (7) 4. Francois, P., Bonaventure, O.: Avoiding transient loops during IGP convergence in IP networks. In: IEEE Infocom. (2005) 5. Bryant, S., Filsfils, C., Previdi, S., Shand, M.: IP Fast Reroute using tunnels (2004) Internet draft, draft-bryant-ipfrr-tunnels-00.txt, work in progress. 6. Bryant, S., Zhang, M.: A framework for loop-free convergence (2004) Internet draft, draft-bryant-shand-lf-conv-frmwk-00.txt, work in progress. 7. Zhong, Z., Nelakuditi, S., Yu, Y., Lee, S., Wang, J., Chuah, C.N.: Failure Inferencing based Fast Rerouting for Handling Transient Link and Node Failures. In: Global Internet Symposium, Miami (2005) 8. Atlas, A.: U-turn alternates for IP/LDP fast-reroute (2005) Internet draft, draftatlas-ip-local-protect-uturn-02, work in progress.. Routing Area Working Group: zinin/ietf/rtgwg (2004) 0. Keralapura, R., Chuah, C.N., Iannaconne, G., Bhattacharrya, S.: Service availability: A new approach to characterize IP backbone topologies. In: Proc. International Workshop on Quality of Service (IWQoS). (2004). Iannaccone, G., Chuah, C.N., Bhattacharyya, S., Diot, C.: Feasibility of IP restoration in a tier- backbone. IEEE Network Magazine, Special Issue on Protection, Restoration and Disaster Recovery (2004)

Mitigating transient loops through interface-specific forwarding

Mitigating transient loops through interface-specific forwarding Available online at www.sciencedirect.com Computer Networks 52 (2008) 593 609 www.elsevier.com/locate/comnet Mitigating transient loops through interface-specific forwarding Srihari Nelakuditi a, *, Zifei

More information

OSPF with Deterministic Routing

OSPF with Deterministic Routing OSPF with Deterministic Routing Sachin Bojewar Associate Professor, Vidyalankar Institute of Technology, Wadala, Mumbai, India Dnyaneshwar Dhangar Vidyalankar Institute of Technology, Wadala, Mumbai, India

More information

Physical-Layer Communication Recovery for Heterogeneous Network

Physical-Layer Communication Recovery for Heterogeneous Network Physical-Layer Communication Recovery for Heterogeneous Network Po-Kai Tseng 1, Wei-Ho Chung 1, Kate Ching-Ju Lin 1, Chi-Sheng Shih 2, and Ling-Jyh Chen 3 1 Research Center for Information Technology Innovation,

More information

Deterministic Routing in OSPF for Post Single Link Failure

Deterministic Routing in OSPF for Post Single Link Failure Deterministic Routing in OSPF for Post Single Link Failure Dnyaneshwar Dhangar 1, Sachin Bojewar 2 1 (Information Technology/ Mumbai, India) 1 (Information Technology/ Mumbai, India) ABSTRACT : In the

More information

THE Internet has seen tremendous growth in the past decade

THE Internet has seen tremendous growth in the past decade IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 359 Fast Local Rerouting for Handling Transient Link Failures Srihari Nelakuditi, Member, IEEE, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang, Member,

More information

Fast Local Rerouting for Handling Transient Link Failures

Fast Local Rerouting for Handling Transient Link Failures Fast Local Rerouting for Handling Transient Link Failures Srihari Nelakuditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang and Chen-Nee Chuah Univ. of South Carolina, Columbia Univ. of Minnesota, Minneapolis

More information

Fast Local Rerouting for Handling Transient Link Failures

Fast Local Rerouting for Handling Transient Link Failures Fast Local Rerouting for Handling Transient Link Failures Srihari Nelakuditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang, and Chen-Nee Chuah Abstract Link failures are part of the day to day operation of a

More information

Loop-Free Convergence with Unordered Updates

Loop-Free Convergence with Unordered Updates Loop-Free Convergence with Unordered Updates Glenn Robertson, Nirupam Roy, Phani Krishna Penumarthi, Srihari Nelakuditi, Jason M. O Kane Abstract This paper studies the feasibility of minimizing convergence

More information

STUDIES on the occurrence of failures in a backbone

STUDIES on the occurrence of failures in a backbone IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 4, NO. 2, JUNE 207 373 Loop-Free Convergence With Unordered Updates Glenn Robertson, Nirupam Roy, Phani Krishna Penumarthi, Srihari Nelakuditi,

More information

Mitigation of Transient Loops in IGP Networks

Mitigation of Transient Loops in IGP Networks Mitigation of Transient Loops in IGP Networks Mohammed Yousef 1, David K. Hunter 1 1 School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex CO4 3SQ,

More information

Ordered FIB Updates. draft-francois-ordered-fib-01.txt. Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant

Ordered FIB Updates. draft-francois-ordered-fib-01.txt. Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant Ordered FIB Updates draft-francois-ordered-fib-01.txt Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant Outline Quick reminder on ordered FIB updates Convergence time of ordered

More information

Link/Node Failure Recovery through Backup Path Lengths

Link/Node Failure Recovery through Backup Path Lengths Link/Node Failure Recovery through Backup Path Lengths Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore Department of Computer Science and Engineering, Vignan University, Guntur,

More information

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Kang Xi and H. Jonathan Chao April 00 New York State CENTER FOR ADVANCED TECHNOLOGY IN TELECOMMUNICATIONS Supported by the New

More information

Enhancing TCP performance in IP fast reroute

Enhancing TCP performance in IP fast reroute Title Enhancing TCP performance in IP fast reroute Author(s) Mao, M; Wen, Z; Yeung, LK Citation The IEEE International Conference on Communications (ICC 2012), Ottawa, ON., 10-15 June 2012. In IEEE International

More information

A Fast Rerouting Scheme for OSPF/IS-IS Networks

A Fast Rerouting Scheme for OSPF/IS-IS Networks A Fast Rerouting Scheme for OSPF/IS-IS Networks Yong Liu, A. L. Narasimha Reddy ELEN Department, TAMU, College Station, TX 77843 Email: {yongliu,reddy}@ee.tamu.edu Abstract Most current backbone networks

More information

Disruption free topology reconfiguration in OSPF networks

Disruption free topology reconfiguration in OSPF networks Disruption free topology reconfiguration in OSPF networks Pierre Francois Dept CSE Université catholique de Louvain (UCL) Belgium francois@info.ucl.ac.be Mike Shand Cisco Systems mshand@cisco.com Olivier

More information

Failure Insensitive Routing for Ensuring Service Availability

Failure Insensitive Routing for Ensuring Service Availability Failure Insensitive Routing for Ensuring Service Availability Srihari Nelakuditi 1, Sanghwan Lee 2, Yinzhe Yu 2, and Zhi-Li Zhang 2 1 Dept. of Computer Science & Engineering, University of South Carolina,

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016 9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:

More information

Failure Insensitive Routing for Ensuring Service Availability

Failure Insensitive Routing for Ensuring Service Availability Failure Insensitive Routing for Ensuring Service Availability Srihari Nelakuditi 1, Sanghwan Lee 2, Yinzhe Yu 2, and Zhi-Li Zhang 2 1 Dept. of Computer Science & Engineering, University of South Carolina,

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: January 2010

Internet Engineering Task Force (IETF) Request for Comments: ISSN: January 2010 Internet Engineering Task Force (IETF) M. Shand Request for Comments: 5715 S. Bryant Category: Informational Cisco Systems ISSN: 2070-1721 January 2010 Abstract A Framework for Loop-Free Convergence A

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on IP

More information

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Module 8. Routing. Version 2 ECE, IIT Kharagpur Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and

More information

Internet Engineering Task Force (IETF) Orange R. Shakir Google March 2018

Internet Engineering Task Force (IETF) Orange R. Shakir Google March 2018 Internet Engineering Task Force (IETF) Request for Comments: 8355 Category: Informational ISSN: 2070-1721 C. Filsfils, Ed. S. Previdi, Ed. Cisco Systems, Inc. B. Decraene Orange R. Shakir Google March

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Failure Insensitive Routing for Ensuring Service Availability

Failure Insensitive Routing for Ensuring Service Availability Failure Insensitive Routing for Ensuring Service Availability Srihari Nelauditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering University

More information

CS 204 Lecture Notes on Elementary Network Analysis

CS 204 Lecture Notes on Elementary Network Analysis CS 204 Lecture Notes on Elementary Network Analysis Mart Molle Department of Computer Science and Engineering University of California, Riverside CA 92521 mart@cs.ucr.edu October 18, 2006 1 First-Order

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

IP Fast Reroute with Failure Inferencing

IP Fast Reroute with Failure Inferencing IP ast Reroute with ailure Inferencing Junling Wang Srihari Nelakuditi University of South arolina, olumbia Presenter: Sanghwan Lee Kookmin University, Seoul, Korea 1 Outline IP ast Reroute and xisting

More information

Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures

Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Selvamani K 1, Kanimozhi S 2, Elakkiya R 3 and Kannan A 4 1,3 Department of Computer Science

More information

Avoiding transient loops during the convergence of link-state routing protocols

Avoiding transient loops during the convergence of link-state routing protocols 1 Avoiding transient loops during the convergence of link-state routing protocols Pierre Francois and Olivier Bonaventure Université catholique de Louvain Abstract When using link-state protocols such

More information

A New Architecture for Multihop Optical Networks

A New Architecture for Multihop Optical Networks A New Architecture for Multihop Optical Networks A. Jaekel 1, S. Bandyopadhyay 1 and A. Sengupta 2 1 School of Computer Science, University of Windsor Windsor, Ontario N9B 3P4 2 Dept. of Computer Science,

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

Fast IP Network Recovery using MRC

Fast IP Network Recovery using MRC International Journal of Research in Computer Science ISSN 2249-8257 Volume 1 Issue 1 (2011) pp. 75-88 White Globe Publications www.ijorcs.org Fast IP Network Recovery using MRC T.K Rajesh 1, N. Sreenivasulu

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

COM-208: Computer Networks - Homework 6

COM-208: Computer Networks - Homework 6 COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

Fast Rerouting Algorithms for Routing Protocols in IP Networks

Fast Rerouting Algorithms for Routing Protocols in IP Networks Fast Rerouting Algorithms for Routing Protocols in IP Networks Depavath Harinath 1, M.V.Ramana Murthy2, Mrs.Kata Swathi3 Department of Computer Science, HRD Degree and PG College, Hyderabad, Telangana,

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Mobile host protocols support host

Mobile host protocols support host INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical

More information

Adaptive Proportional Routing: A Localized QoS Routing Approach

Adaptive Proportional Routing: A Localized QoS Routing Approach 790 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 6, DECEMBER 2002 Adaptive Proportional Routing: A Localized QoS Routing Approach Srihari Nelakuditi, Member, IEEE, Zhi-Li Zhang, Associate Member,

More information

MULTICAST EXTENSIONS TO OSPF (MOSPF)

MULTICAST EXTENSIONS TO OSPF (MOSPF) MULTICAST EXTENSIONS TO OSPF (MOSPF) Version 2 of the Open Shortest Path First (OSPF) routing protocol is defined in RFC-1583. It is an Interior Gateway Protocol (IGP) specifically designed to distribute

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL

A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL H. El-Sayed, M. Ahmed, M. Jaseemuddin, D. Petriu UAE University, Al-Ain P.O.Box, UAE, helsayed@uaeu.ac.ae, CIENA

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Advanced Topics in Routing

Advanced Topics in Routing Advanced Topics in Routing EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC

More information

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

ETSF05/ETSF10 Internet Protocols. Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks

More information

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources World Engineering & Applied Sciences Journal 7 (4): 212-219, 2016 ISSN 2079-2204 IDOSI Publications, 2016 DOI: 10.5829/idosi.weasj.2016.212.219 Mitigating Link Failures and Implementing Security Mechanism

More information

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan Internet Protocol: Routing Algorithms Srinidhi Varadarajan Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction for routing algorithms:

More information

Link-State Routing OSPF

Link-State Routing OSPF CE Computer Networks Link-State Routing OSPF Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Network Routing - II Failures, Recovery, and Change

Network Routing - II Failures, Recovery, and Change MIT 6.02 DRAFT Lecture Notes Spring 2009 (Last update: April 27, 2009) Comments, questions or bug reports? Please contact Hari Balakrishnan (hari@mit.edu) or 6.02-staff@mit.edu LECTURE 21 Network Routing

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science

More information

Request for Comments: 3277 Category: Informational April Intermediate System to Intermediate System (IS-IS) Transient Blackhole Avoidance

Request for Comments: 3277 Category: Informational April Intermediate System to Intermediate System (IS-IS) Transient Blackhole Avoidance Network Working Group D. McPherson Request for Comments: 3277 TCB Category: Informational April 2002 Status of this Memo Intermediate System to Intermediate System (IS-IS) Transient Blackhole Avoidance

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Homework 3 Out: 11/19 Due: 11/26 Instructions 1. Turn in a physical copy at the beginning of the class on 11/26 2. Ensure the HW cover page has the following information clearly

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Fast Rerouting for IP Multicast Under Single Node Failures

Fast Rerouting for IP Multicast Under Single Node Failures Fast Rerouting for IP Multicast Under Single Node Failures Aditya Sundarrajan, Srinivasan Ramasubramanian Department of Electrical and Computer Engineering University of Arizona Abstract In this paper,

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

ETSF05/ETSF10 Internet Protocols Routing on the Internet

ETSF05/ETSF10 Internet Protocols Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet 2014, (ETSF05 Part 2), Lecture 1.1 Jens Andersson Circuit switched routing 2014 11 05 ETSF05/ETSF10 Internet Protocols 2 Packet switched Routing

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

Packet Re-cycling: Eliminating Packet Losses due to Network Failures

Packet Re-cycling: Eliminating Packet Losses due to Network Failures : Eliminating Packet Losses due to Network Failures Suksant Sae Lor s.lor@ee.ucl.ac.uk Raul Landa r.landa@ee.ucl.ac.uk Network and Services Research Laboratory Department of Electronic and Electrical Engineering

More information

ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION

ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION P.-K. Tseng et al., Int. J. of Safety and Security Eng., Vol. 5, No. 1 (2015) 29 47 ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION P.-K. TSENG, W.-H. CHUNG,

More information

CS BGP v4. Fall 2014

CS BGP v4. Fall 2014 CS 457 - BGP v4 Fall 2014 Autonomous Systems What is an AS? a set of routers under a single technical administration uses an interior gateway protocol (IGP) and common metrics to route packets within the

More information

Lecture 12: Link-state Routing. Lecture 12 Overview. Router Tasks. CSE 123: Computer Networks Chris Kanich. Routing overview

Lecture 12: Link-state Routing. Lecture 12 Overview. Router Tasks. CSE 123: Computer Networks Chris Kanich. Routing overview Lecture : Link-state Routing CSE 3: Computer Networks Chris Kanich Lecture Overview Routing overview Intra vs. Inter-domain routing Link-state routing protocols CSE 3 Lecture : Link-state Routing Router

More information

Configuring BGP. Cisco s BGP Implementation

Configuring BGP. Cisco s BGP Implementation Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols

More information

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 R1. Let s review some of the terminology used in this textbook. Recall that

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be

More information

Internet Engineering Task Force (IETF) M. Shand. B. Decraene France Telecom J. Uttaro AT&T N. Leymann M. Horneffer Deutsche Telekom June 2012

Internet Engineering Task Force (IETF) M. Shand. B. Decraene France Telecom J. Uttaro AT&T N. Leymann M. Horneffer Deutsche Telekom June 2012 Internet Engineering Task Force (IETF) Request for Comments: 6571 Category: Informational ISSN: 2070-1721 C. Filsfils, Ed. Cisco Systems P. Francois, Ed. Institute IMDEA Networks M. Shand B. Decraene France

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

IP Fast Reroute Applicability. Pierre Francois Institute IMDEA Networks

IP Fast Reroute Applicability. Pierre Francois Institute IMDEA Networks IP Fast Reroute Applicability Pierre Francois Institute IMDEA Networks Pierre.Francois@imdea.org Agenda IGP (Fast) Convergence IGP Fast Reroute (Hitless maintenance operations) IGP Fast convergence Pushing

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

Comprehensive Solution for Anomaly-free BGP

Comprehensive Solution for Anomaly-free BGP Comprehensive Solution for Anomaly-free BGP Ravi Musunuri, Jorge A. Cobb Department of Computer Science, The University of Texas at Dallas, Richardson, TX-7083-0688 musunuri, cobb @utdallas.edu Abstract.

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Dynamic Routing Protocol Performance in a Fault-Tolerant Ethernet-based IP Network

Dynamic Routing Protocol Performance in a Fault-Tolerant Ethernet-based IP Network Dynamic Routing Protocol Performance in a Fault-Tolerant Ethernet-based IP Network Jan Baranski, Marshall Crocker, Georgios Lazarou Department of Electrical and Computer Engineering Mississippi State University

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Introduction to Internet Routing

Introduction to Internet Routing Introduction to Internet Routing (RCSE) Lecture Based on Slides by Prof. Dr. Günter Schäfer Page Topics of Special course on planning aspects in communication networks Prior attendance of courses Telematics

More information

UNIT- 2 Physical Layer and Overview of PL Switching

UNIT- 2 Physical Layer and Overview of PL Switching UNIT- 2 Physical Layer and Overview of PL Switching 2.1 MULTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. Figure

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy

More information

Configure SR-TE Policies

Configure SR-TE Policies This module provides information about segment routing for traffic engineering (SR-TE) policies, how to configure SR-TE policies, and how to steer traffic into an SR-TE policy. About SR-TE Policies, page

More information

C13b: Routing Problem and Algorithms

C13b: Routing Problem and Algorithms CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source

More information

Helsinki University of Technology Telecommunications Laboratory. OSPF Routing Protocol Licenciate course seminar paper

Helsinki University of Technology Telecommunications Laboratory. OSPF Routing Protocol Licenciate course seminar paper Helsinki University of Technology Telecommunications Laboratory OSPF Routing Protocol Licenciate course seminar paper Shkumbin I. Hamiti, 08.10.1996 Communications Laboratory, TKK-HUT email: bini#tiltu.hut.fi

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information